diff --git a/cves/2024/13xxx/CVE-2024-13067.json b/cves/2024/13xxx/CVE-2024-13067.json new file mode 100644 index 000000000000..f4e9e63b5623 --- /dev/null +++ b/cves/2024/13xxx/CVE-2024-13067.json @@ -0,0 +1,163 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-13067", + "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "state": "PUBLISHED", + "assignerShortName": "VulDB", + "dateReserved": "2024-12-31T08:35:38.425Z", + "datePublished": "2024-12-31T09:00:52.751Z", + "dateUpdated": "2024-12-31T09:00:52.751Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "shortName": "VulDB", + "dateUpdated": "2024-12-31T09:00:52.751Z" + }, + "title": "CodeAstro Online Food Ordering System All Users Page all_users.php access control", + "problemTypes": [ + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-284", + "lang": "en", + "description": "Improper Access Controls" + } + ] + }, + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-266", + "lang": "en", + "description": "Incorrect Privilege Assignment" + } + ] + } + ], + "affected": [ + { + "vendor": "CodeAstro", + "product": "Online Food Ordering System", + "versions": [ + { + "version": "1.0", + "status": "affected" + } + ], + "modules": [ + "All Users Page" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in CodeAstro Online Food Ordering System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/all_users.php of the component All Users Page. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "de", + "value": "Eine kritische Schwachstelle wurde in CodeAstro Online Food Ordering System 1.0 gefunden. Betroffen davon ist ein unbekannter Prozess der Datei /admin/all_users.php der Komponente All Users Page. Mittels Manipulieren mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung." + } + ], + "metrics": [ + { + "cvssV4_0": { + "version": "4.0", + "baseScore": 6.9, + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV3_1": { + "version": "3.1", + "baseScore": 5.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV3_0": { + "version": "3.0", + "baseScore": 5.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV2_0": { + "version": "2.0", + "baseScore": 5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" + } + } + ], + "timeline": [ + { + "time": "2024-12-31T00:00:00.000Z", + "lang": "en", + "value": "Advisory disclosed" + }, + { + "time": "2024-12-31T01:00:00.000Z", + "lang": "en", + "value": "VulDB entry created" + }, + { + "time": "2024-12-31T09:40:42.000Z", + "lang": "en", + "value": "VulDB entry last update" + } + ], + "credits": [ + { + "lang": "en", + "value": "John Correche (VulDB User)", + "type": "reporter" + } + ], + "references": [ + { + "url": "https://vuldb.com/?id.289823", + "name": "VDB-289823 | CodeAstro Online Food Ordering System All Users Page all_users.php access control", + "tags": [ + "vdb-entry" + ] + }, + { + "url": "https://vuldb.com/?ctiid.289823", + "name": "VDB-289823 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required" + ] + }, + { + "url": "https://vuldb.com/?submit.472081", + "name": "Submit #472081 | CodeAstro Online Food Ordering System 1.0 Broken Access Control", + "tags": [ + "third-party-advisory" + ] + }, + { + "url": "https://github.com/shaturo1337/POCs/blob/main/Broken%20Access%20Control%20in%20Online%20Food%20Ordering%20System.md", + "tags": [ + "exploit" + ] + }, + { + "url": "https://codeastro.com/", + "tags": [ + "product" + ] + } + ] + } + } +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index 70a2e9712b1d..2d28d11b1289 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,12 +1,12 @@ { - "fetchTime": "2024-12-31T08:46:18.876Z", + "fetchTime": "2024-12-31T09:06:31.838Z", "numberOfChanges": 1, "new": [ { - "cveId": "CVE-2024-49422", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49422", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49422.json", - "dateUpdated": "2024-12-31T08:43:13.628Z" + "cveId": "CVE-2024-13067", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13067", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13067.json", + "dateUpdated": "2024-12-31T09:00:52.751Z" } ], "updated": [], diff --git a/cves/deltaLog.json b/cves/deltaLog.json index 08940eac37e2..084b7b41d66e 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,18 @@ [ + { + "fetchTime": "2024-12-31T09:06:31.838Z", + "numberOfChanges": 1, + "new": [ + { + "cveId": "CVE-2024-13067", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13067", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13067.json", + "dateUpdated": "2024-12-31T09:00:52.751Z" + } + ], + "updated": [], + "error": [] + }, { "fetchTime": "2024-12-31T08:46:18.876Z", "numberOfChanges": 1,